{"id":9340,"date":"2018-09-28T07:28:25","date_gmt":"2018-09-28T07:28:25","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=9340"},"modified":"2019-07-18T10:24:42","modified_gmt":"2019-07-18T10:24:42","slug":"cloud-computing-mobile-devices-relation-impacting-security-game","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/","title":{"rendered":"Cloud Computing and Mobile Devices: A Relation Impacting the Security Game"},"content":{"rendered":"<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Cloud_Computing_and_Mobile_Devices\"><\/span>Cloud Computing and Mobile Devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/09\/21285195.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9341\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/09\/21285195.jpg\" alt=\"\" width=\"1000\" height=\"1000\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/09\/21285195.jpg 1000w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/09\/21285195-150x150.jpg 150w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/09\/21285195-300x300.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/09\/21285195-660x660.jpg 660w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/#Cloud_Computing_and_Mobile_Devices\" >Cloud Computing and Mobile Devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/#Comparing_with_the_earlier_era\" >Comparing with the earlier era:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/#The_facts_and_figures_on_security_breaches\" >The facts and figures on security breaches:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/#The_rise_of_new_challenges\" >The rise of new challenges:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/#Check_out_the_loop-holes_in_security_given_below\" >Check out the loop-holes in security, given below:<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/#Conclusion\" >Conclusion:<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"Comparing_with_the_earlier_era\"><\/span><strong style=\"font-size: 16px;\">Comparing with the earlier era:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Before mobiles became \u2018smartphones\u2019, the life was slow, less hectic and mobiles were just merely what they are called \u2013 \u2018mobiles\u2019; meaning portable devices. Around a decade ago, a massive turnaround of investments happened through which there began an internet revolution. After that, mobiles became so powerful than even the desktops of an earlier decade.<\/p>\n<p style=\"text-align: justify;\">The term, <a href=\"https:\/\/www.esds.co.in\/enlight-cloud-hosting\"><strong>\u2018cloud computing\u2019<\/strong><\/a> further lead to the term \u2018mobile cloud computing\u2019 and these both words are one of the most used and misused terms in the technology industry today. The main purpose of these services lies in quicker access facility to the users irrespective of the location and time.<\/p>\n<p style=\"text-align: justify;\">The huge number of internet-connected device market is captured by smartphones today than other laptops and desktops, and therefore mobile cloud computing has grown to a high scale.<\/p>\n<p style=\"text-align: justify;\">When mobile computing was not in existence, the physical IT assets of the company which were owned and managed were the only things having <a href=\"https:\/\/www.mtvscan.com\"><strong>security<\/strong><\/a>. But today, the scenes are different. Mobiles are dominating the world and are the fundamental source of internet for each and every user. Even being so, they have very little physical security which came just a few years back (mobile insurance). Hackers have this opportunity and rather they have a chalked-out path for hacking all these devices as it is very easy to root, jail-break or hoodwink the device of any user. One person sitting in a corner of the world can access your device \u2013 this thought itself is very frightening! Hence, there is a strong demand for security as a service.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_facts_and_figures_on_security_breaches\"><\/span><strong>The facts and figures on security breaches:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">As per the latest study made by SANS Institute, 12% of the IT budget is spent on only security. The reasons are pretty evident. Studies show that companies are having chances of 27.7% of material data breach and they will have to spend over $3.6 million on it in the coming 2 years.<\/p>\n<p style=\"text-align: justify;\">There are several things which cause concerns on<a href=\"https:\/\/www.esds.co.in\/security-insight-services\"><strong> security levels<\/strong> <\/a>because, if your applications get hacked then the repercussions include deteriorated brand value, increased liabilities, regulatory risks, and of course financial losses. Considering the data of the last eight years, more than 7 billion identities were stolen in the data breach attacks! That accounts for one data-theft attack for one person on the earth! This scenario is getting complicated every day as there is a constant rise in the mobile expansion. Further, it is creating a very vulnerable and complicated environment which is back-breaking for managing and protecting the data. More than 60% of security managers get concerned about the heavy usage of insecure mobile applications and the number of such applications is increasing day-by-day. This situation is causing stress to the users as well as to the <a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\"><strong>security solution<\/strong> <strong>developers and designers.<\/strong><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_rise_of_new_challenges\"><\/span><strong>The rise of new challenges:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Due to such big losses in the past and coming ahead, the security world needs a precise solution which could prevent and counter-attack these threats. The computing world is significantly changing and therefore, security is not just limited to the physical IT assets. The users being more \u2018mobile\u2019 than ever and constantly connected to the internet desire more security of their data and need recovery options. The birth of <a href=\"https:\/\/www.esds.co.in\/iot\"><strong>IoT<\/strong> <\/a>has contributed to a number of cloud-connected devices and the numbers will be increasing rapidly in billions.<\/p>\n<p style=\"text-align: justify;\">The combination of mobile plus internet connectivity reaching new heights is giving new business models an opportunity to take advantage and increase their revenues. Therefore, new business models also came with a bunch of new loop-holes in security.<\/p>\n<p style=\"text-align: justify;\">\n<h2><span class=\"ez-toc-section\" id=\"Check_out_the_loop-holes_in_security_given_below\"><\/span><strong>Check out the loop-holes in security, given below:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">First, modes of payment have changed drastically since the smartphone era. Near Field Communications (NFC) are getting popular on mobile devices. Every single app which provides service has the facility to pay online. All such apps require the payment account\u2019s credentials for authenticating the users. Therefore, these details get stored on the device. These details have high chances of getting compromised, and if it happens then the hackers will be free to make fraudulent transactions through anyone\u2019s bank accounts. Nowadays, they can directly ask your bank details by pretending someone from your contacts or trust-worthy people!<\/p>\n<p style=\"text-align: justify;\">Second, the facility for parking your car with a mobile can also turn as a bane to you and the automobile industry. If your device gets breached, you can imagine what types of fatal attacks are possible.<\/p>\n<p style=\"text-align: justify;\">Third, personal data is also collected in the healthcare industry. We use smartphones and smart-watches to track our fitness goals, details, blood sugar levels, BP, etc. The purpose of this facility is to get data-driven treatment when required. If these devices get hacked, then there could be serious repercussions of life-threats.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">Such situations are arising and can arise even further. Our society needs more solutions in terms of security. Due to this reason, several <a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\"><strong>SOC (Service Operations Centers)<\/strong><\/a> are coming up and we need more but, reliable and robust ones providing fully managed security services. The users also have to be more careful while handling the apps and should know which are really useful and which are not. Also, there is no need to give every single permission to every app, you can customize the settings. All these aspects together can help the world in building a more secure future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Computing and Mobile Devices Comparing with the earlier era: Before mobiles became \u2018smartphones\u2019, the life was slow, less hectic and mobiles were just merely what they are called \u2013 \u2018mobiles\u2019; meaning portable devices. Around a decade ago, a massive turnaround of investments happened through which there began an internet revolution. After that, mobiles became&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/cloud-computing-mobile-devices-relation-impacting-security-game\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":57,"featured_media":9342,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[1345,1434,299,1394,169,1516,1914,1361,1816,1196,1195],"class_list":["post-9340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","tag-cloud-computing","tag-cloud-iot","tag-cloud-security","tag-cloud-service-providers","tag-data-security","tag-enlight-iot","tag-esds-vtmscan","tag-iot","tag-soc-as-a-service","tag-web-security-app","tag-website-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/9340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=9340"}],"version-history":[{"count":5,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/9340\/revisions"}],"predecessor-version":[{"id":10644,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/9340\/revisions\/10644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/9342"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=9340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=9340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=9340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}